Sciweavers

298 search results - page 15 / 60
» Reconciling role based management and role based access cont...
Sort
View
JUCS
2010
151views more  JUCS 2010»
13 years 3 months ago
A Semantic Wiki Framework for Reconciling Conflict Collaborations Based on Selecting Consensus Choice
: Semantic wikis have been regarded as an important collaboration tool among a number of experts from multiple domains. This wiki platform can play a role of collaborative knowledg...
Dosam Hwang, Ngoc Thanh Nguyen, Jason J. Jung, Abo...
AINA
2006
IEEE
14 years 2 months ago
Distributed Key Management for Secure Role based Messaging
Secure Role Based Messaging (SRBM) augments messaging systems with role oriented communication in a secure manner. Role occupants can sign and decrypt messages on behalf of roles....
Gansen Zhao, Sassa Otenko, David W. Chadwick
ISI
2004
Springer
14 years 2 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
POLICY
2004
Springer
14 years 2 months ago
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
Moritz Y. Becker, Peter Sewell
ACSAC
2008
IEEE
14 years 3 months ago
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies
Role hierarchies are fundamental to the role based access control (RBAC) model. The notion of role hierarchy is a well understood concept that allows senior roles to inherit the p...
Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri